Dumpster Diving - Thieves look through garbage for any personal informationLost or Stolen Items - Personal Identification is obtained by stealing wallets, mail, etcSkimming - Capturing Credit or Debit card information at an ATM or collecting information through a device attached to the Swipe MachinePhishing - Deceptive emails, pop-up messages or phone calls to gather personal informationChanging Your Address - thieves complete a change of address form in your name so they are receiving all mail itemsPretexting - using false pretenses to obtain personal information, usually claiming there is an issue with your actual banking informationOn-Lookers - Obtaining personal information by looking over your shoulder at Checking, Debit, or Credit card terminals, or even at a publicly used computerPharming - Redirect website traffic to a bogus websiteUnsecure Networks - Thieves gain network access by using home or work networks that are not secure with a login password or computers unprotected by Anti-virus or Spyware programs.Keyloggers - software program that records the keystrokes entered on the PC on which it is installed and transmits a record to the person controlling the PC.MalWare's Man-in-the-middle (MIM) - fraudster inserts themselves between the customer and the bank and hijacks the online session.